Search This Blog

Tuesday, May 04, 2010

5 Technology Security Myths, Busted

Network World Security - Newsletter - networkworld.com
Windows needs a built-in PDF viewer, argues researcher | Erasing Your Digital Tracks on the Web

Network World Security

Forward this to a Friend >>>


5 Technology Security Myths, Busted
Think you can hide behind the privacy of an "unlisted" cell phone number? Think again. Maybe you believe you don't need security software on a Mac or iPad. You'd swear that Firefox is the safest browser in town. Wrong on both counts. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Learn More

Windows needs a built-in PDF viewer, argues researcher
Microsoft should add a basic PDF viewer to Windows to help protect users from the spike in attacks exploiting bugs in Adobe's Reader, a security researcher said. Read More

Erasing Your Digital Tracks on the Web
The Internet never forgets. Search engines crawl and index every last byte of information available on the Web; and once a piece of information goes online, some digital echo of it is virtually guaranteed to persist on a server somewhere. Read More


WHITE PAPER: MegaPath

Understanding the Value of Managed Security UTM Solutions
This Yankee Group paper describes why multiple security layers are needed to achieve comprehensive and cost-effective security solutions. Learn More

Are you ready for these Internet security threats?
Symantec just released its latest annual Internet security threat report and it shows that hackers and attackers are more prolific than ever. Learn about the areas where your enterprise is most vulnerable, as well as what new threats emerged in 2009. Read More

New cyber attacks more malicious than Love Bug: Symantec
A decade after the Love Bug virus attacked millions of computers worldwide and put the Philippines in the IT world map in a negative way, computer security experts have noticed that today's computer attacks are more malicious than the original computer security threat. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Security issues? Try SQL Server Agent Proxies…
In the good old days of SQL Server, all we had to do was make our service account a member of the local administrators group and we were all set. Of course, those days have gone and that practice is now rightly regarded as a security risk of elevated proportions. The SQL Server setup.exe will now give your ordinary domain user account the bare minimum permissions in order to run the service – nothing... Read More

Symantec encryption buyouts raise open source, overlap questions
Symantec's announced acquisitions Thursday of data encryption specialists PGP Corp. and GuardianEdge Technologies have industry watchers wondering which products will stay and go, and how open source PGP will fare in the wake of the buyouts. Read More

An information security blueprint, part 1
The recent the Hydraq attacks were the latest example of just how radically the Internet threat landscape has changed over the past few years, and how vulnerable companies and their information stores are to cyber attacks. The attackers were not hackers, they were criminals attempting to steal intellectual property. Hydraq is an example of how cybercrime has evolved from hackers simply pursuing public notoriety to covert, well-organized attacks that leverage insidious malware and social engineering tactics to target key individuals and penetrate corporate networks. Many of today's attacks are highly sophisticated espionage campaigns attempting to silently steal confidential information. This should raise the alarm for companies of all sizes and across all industries, as information is a business' most Read More

After verdict, debate rages in Terry Childs case
The guilty verdict in the case of former network administrator Terry Childs is evoking mixed responses within the industry. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Confessions of tech hoarders
How much hardware do you have hidden in your home's nooks and crannies? One tech hoarder shares pictures of his stash, as well as those of some readers.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Out-of-this-world Apple iPad 3G has 5 antennas
  2. U.S. Air Force phishing test transforms into a problem
  3. Adobe: 'Not you, too, Microsoft!'
  4. Woz gets Apple engineer fired over iPad
  5. Palin e-mail snoop found guilty on two charges
  6. Cisco, others dance around 40G Ethernet for data centers
  7. With BumpTop buy, Google on record acquisition pace
  8. Google: Crank up the heat in your data center
  9. Citrix downplays Red Hat's decision to drop Xen
  10. Microsoft kills Courier tablet project

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: